Role in IT decision-making process:Align Business & IT GoalsCreate IT StrategyDetermine IT NeedsManage Vendor RelationshipsEvaluate/Specify Brands or VendorsOther RoleAuthorize PurchasesNot Involved

Work Phone:

Company:

Company Size:

Industry:

Street Address

City:

Zip/postal code

State/Province:

Country:

Occasionally, we send subscribers special offers from select partners. Would you like to receive these special partner offers via e-mail?YesNo

Your registration with Eweek will include the following free email newsletter(s):News & Views

By submitting your wireless number, you agree that eWEEK, its related properties, and vendor partners providing content you view may contact you using contact center technology. Your consent is not required to view content or use site features.

By clicking on the "Register" button below, I agree that I have carefully read the Terms of Service and the Privacy Policy and I agree to be legally bound by all such terms.

WEBINAR:On-Demand

Twitter continues to battle a new iteration of a worm that first hit users of the service over the weekend.

The worm, dubbed "StalkDaily," exploits a cross-site scripting vulnerability. It began to spread this weekend, and so far only seems to infect users' profiles with the goal of propagating. According to its confessed creator, Mikeyy Mooney, the worm was created "out of boredom" to give developers an insight into a cross-site scripting flaw while promoting his Website.

"We are currently addressing a new manifestation of the worm attack," according to an update by Twitter Monday. "No passwords, phone numbers, or other sensitive information were compromised as part of this renewed attack."

Biz Stone, co-founder of Twitter, blogged that the worm introduced this weekend was similar to the famous Samy worm, which spread across the popular MySpace social networking site a while back.

"At about 2AM on Saturday, four accounts were created that began spreading a worm on Twitter," Stone wrote. "From 7:30AM until 11AM PST, our security team worked on eliminating the vectors that could identify this worm. At that time, about 90 accounts were compromised. We identified and secured these accounts."

The worm propagated by luring users to the StalkDaily.com site, where their profiles were infected in order to send out similar spam-type messages to their contacts. A second wave of the worm hit Saturday afternoon; another hit Twitter users Sunday.

"Again, we secured the accounts that had been compromised and removed any content that might help spread the worm," Stone wrote. "All told, we identified and deleted almost 10,000 tweets that could have continued to spread the worm."

Stone added that Twitter is conducting a full review of what happened and is constantly updating its Web coding practices to avoid vulnerabilities.

Advertiser Disclosure:
Some of the products that appear on this site are from companies from which QuinStreet receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. QuinStreet does not include all companies or all types of products available in the marketplace.